-
Notifications
You must be signed in to change notification settings - Fork 19
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
ADR on how to secure the Fleet-manager (control plane) admin end-point #71
Comments
Hi @akoserwal, I have a couple of questions:
Thanks! |
|
@akoserwal I've merged #72 for you to start writing the content. |
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
What
ADR on how to secure the Fleet-manager (control plane) admin end-point
Authorization for control plane admin APIs
The JWT token contains the necessary roles, which are used by the control plane to make authorization decisions
Currently, these roles are present in the SRE realm and assigned manually to users (Ex: CS-SRE engineers get admin read access)
Roles: read, write, full permissions
SRE realm will be migrated to RH Internal authentication system. Roles with being mapped to rover groups.
The authorization mechanism will remain the same for the fleet manager by changing the identity provider to RH Internal authentication system
The text was updated successfully, but these errors were encountered: